{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T14:10:13.004","vulnerabilities":[{"cve":{"id":"CVE-2026-27679","sourceIdentifier":"cna@sap.com","published":"2026-04-14T00:16:06.413","lastModified":"2026-05-04T14:58:27.130","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Due to missing authorization checks in the SAP S/4HANA frontend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:manage_reference_structures:uis4h_109:*:*:*:*:*:*:*","matchCriteriaId":"AFB5A6C3-F943-49C4-BA93-DC4E74B5E8FA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:sap:s\\/4hana:-:*:*:*:*:*:*:*","matchCriteriaId":"61225714-D573-435F-9423-7AE6A8ED59BC"}]}]}],"references":[{"url":"https://me.sap.com/notes/3716767","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Permissions Required"]}]}}]}